MCQs > Crime & Justice > Criminology (Introduction) MCQs > Cybercrime and the Future of Crime MCQs

Cybercrime and the Future of Crime MCQ

Is worms similar to viruses that reproduce themselves and subvert computer systems but can spread with no assistance?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as hackers who work to protect systems rather than harm them.

Answer

Correct Answer: “white hat” hackers

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as a secret, malicious computer program hidden within other programs.

Answer

Correct Answer: Trojan horse

Note: This Question is unanswered, help us to find answer for this one

_____ is creates a false (shadow) version of a website that is controlled by the attacker.

Answer

Correct Answer: Spoofing

Note: This Question is unanswered, help us to find answer for this one

Is salami techniques a computer crime in which small slices (amounts of money) are taken from many accounts and transferred to that of the thief?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as entails a cracker stealing password, account, or credit card information.

Answer

Correct Answer: Phishing

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as items that are in high demand to be stolen.

Answer

Correct Answer: Hot products

Note: This Question is unanswered, help us to find answer for this one

_____ is that there should be no restrictions on their right to surf the Internet and test systems.

Answer

Correct Answer: Hacker’s ethic

Note: This Question is unanswered, help us to find answer for this one

Is hackers unwanted electronic guests regardless of motive?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as procedures that ask a panel of experts to predict the future.

Answer

Correct Answer: Delphi techniques

Note: This Question is unanswered, help us to find answer for this one

_____ is defined as crime that uses the computer as a tool in crime commission.

Answer

Correct Answer: Cybercrime

Note: This Question is unanswered, help us to find answer for this one

_____ is the idea that change takes place unevenly— technological changes take place far more quickly than the social aspects of a culture such as its laws and customs.

Answer

Correct Answer: Cultural lag

Note: This Question is unanswered, help us to find answer for this one

Is crackers ill-intended hackers who attempt to crack (break into) computer systems, often in order to do damage?

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

_____ is known as the stereotypical hacker who is a criminal.

Answer

Correct Answer: “Black hat” hacker

Note: This Question is unanswered, help us to find answer for this one

Dos and ddos attacks use _______ to prevent authorized users from accessing the system resources.

Answer

Correct Answer: SYN

Note: This Question is unanswered, help us to find answer for this one

An internet-based crime is referred to as a(n) ____ crime.

Answer

Correct Answer: Cyber

Note: This Question is unanswered, help us to find answer for this one

Web spoofing is creating a false (shadow) version of a website controlled by the attacker.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

The concept that there should be no restrictions on a hacker’s right to surf the net is referred to as ______.

Answer

Correct Answer: Hacker’s ethics

Note: This Question is unanswered, help us to find answer for this one

Which of the following were identified as British Home Office Predictions?

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

The TV show in which online predators were lured on Internet chat rooms to show up at the homes of minors whose parents were supposedly not home was called ______.

Answer

Correct Answer: To Catch a Predator

Note: This Question is unanswered, help us to find answer for this one

The development of newer synthetic drugs like ecstasy poses future challenges for crime control.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

Which of the following were identified as ways to keep children safe on the internet?

Answer

Correct Answer: Parents should play a more proactive role in monitoring their children’s use of the internet.

Note: This Question is unanswered, help us to find answer for this one

______ are subprograms (hidden in a program) that contain a virus, bomb, or other harmful feature.

Answer

Correct Answer: Trojan horses

Note: This Question is unanswered, help us to find answer for this one

Manifest functions are unanticipated, unintended, hidden functions of social change.

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

Which of the following were identified as crime predictions?

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

Delphi techniques are procedures that ask a panel of experts to predict the future.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

The Youth Internet Safety Survey found that ______ percent of the young people they surveyed reported having been the victims of reputed harassment (threats, rumors, or other offensive behavior) during the past year.

Answer

Correct Answer: Six

Note: This Question is unanswered, help us to find answer for this one

Doing psychological harm to or inciting physical harm against others, thereby breaching laws relating to the protection of the person, is an example of ______.

Answer

Correct Answer: Cyberviolence

Note: This Question is unanswered, help us to find answer for this one

______ is the idea that technological changes take place far more quickly than the social aspects of a culture such as its laws and customs.

Answer

Correct Answer: Cultural lag

Note: This Question is unanswered, help us to find answer for this one

Approximately 80 percent of cybercrime is committed by “insiders” or employees.

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

Cyberterrorism includes all of the following except ______.

Answer

Correct Answer: Overt communications

Note: This Question is unanswered, help us to find answer for this one